Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    21-10-2021 18:31

General

  • Target

    invoice.js

  • Size

    23KB

  • MD5

    dabe050bb51ca8ac34498a176ac8227a

  • SHA1

    b07d715fb5daac27e9d55c570ed3707d3858124c

  • SHA256

    2e05ea8c7d2121d1af64ae0a03a8cd42aca8a17be7775678c2d214f47d8dbfc1

  • SHA512

    cbb58f3f962659b91e7ffc72e3ee1d01fd31da0a9c28653d947a6285cfe5da0ceec978c00c7ed667f5bccf476cccf0d25e26dc1e673e06a41d44c7976a67cf6a

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 35 IoCs
  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\invoice.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ztRjTeZckf.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:536

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ztRjTeZckf.js
    MD5

    2697845d2c7ec6c8544bf5479d8b5d7f

    SHA1

    93bb2256e2c2402d0cc121e3c2d385fa87c43e9d

    SHA256

    0a779aefb4dcf1ebf73544e0a59cbf6584490e7954d2dd82772b5ef9b6a446da

    SHA512

    d1d4fdfd9c7b2e0284b977bdd33956c8d49c840b7dc0e618ef8f8dcc67974f2e78d7652db0ea25ad7379b3d1f33274559d648ae2b371ddeedc4a96f98bb91cec

  • memory/536-115-0x0000000000000000-mapping.dmp